Orchestrate and Automate Identity Without Coding Microsoft Azure VMs IoT App Server Database Office Copyright © 2022 CyberArk Software Ltd. All rights reserved. Office 365 IT Ops Tool Salesforce Network Devices Admin Work from Home Google Cloud DevOps Temporary Location Zoom Apps/Machine Cloud Native Apps G Suite 3rd Party Containers Amazon VM’s & Storage Serverless Workforce Mac PC Mobile cyberark.com 2 Companies now use an average of 976 applications, and only 28% of these are integrated 1 45% of organizations see application integration as one of their top challenges 2 3 1 MuleSoft 2 and Deloitte, Connectivity Benchmark Report, 2022 Deloitte, Global Chief Procurement Officer Survey, 2021 cyberark.com Opportunities for risk Lack of control Loss of productivity High cost 4 Copyright © 2022 CyberArk Software Ltd. All rights reserved. cyberark.com Security, efficiency, productivity and data confidence through the automation of identity data, processes and events Copyright © 2022 CyberArk Software Ltd. All rights reserved. cyberark.com Quickly reduce complexity and eliminate manual tasks with flexible workflows Orchestrate Identity data, processes, tasks and events across the enterprise APPLICATION INTEGRATION NO-CODE VISUAL EDITOR Build custom connections quickly and easily with thousands of pre-built connectors Use an intuitive user interface to visualize your workflow and drag and drop elements, no coding needed AUTOMATION DYNAMIC WORKFLOWS Automate complex business process and connect data into workflows quickly and easily Allow end-users to initiate workflows and create dynamic workflows for events requiring user action cyberark.com Integrate applications Leverage thousands of prebuilt connectors and keep all your apps working together as one. 7 cyberark.com Automate Business Processes Automate identity management tasks through no-code app integrations and workflows for identity data, processes and events. 8 cyberark.com Create Dynamic Workflows Use conditional logic to create custom, flexible workflows that adapt and change based on events or triggers. 9 cyberark.com Build Without Coding The Flows no-code/low-code visual editor allows anyone to build and execute workflows, orchestrating identity management by dragging and dropping or selecting from prebuilt templates. 10 cyberark.com What You Can Do With Flows 11 cyberark.com Automation makes identity lifecycle management possible in any app cyberark.com Use external service events and posture to influence access to resources for identities cyberark.com Leverage Flows to automate and orchestrate complex business processes to save time and improve operational efficiencies Present form to collect PAM login info Service account is created by Flows in Active Directory through CyberArk Identity and accounts are linked to correct Safes Flows Retrieves user authentication Token from CyberArk Identity Flows creates request in Slack asking Admin to approve Get list of existing PAM Safes for user to select from in next step Flows provides end user with form to collect service account details cyberark.com • Schedule a personalized demo • Visit CyberArk.com/products/ide ntity-flows to learn more https://www.cyberark.com/try-buy/cloud-entitlements-manager/ cyberark.com 15 Thank You 16 cyberark.com Identities Resources Identity Security Platform Admins Applications & Services Seamless & Secure Access for All Identities Workforce Intelligent Privilege Controls Flexible Identity Automation & Orchestration Infrastructure & Endpoints CyberArk Identity Flows Third Parties Workforce & Customer Access Customers DevOps Endpoint Privilege Security Privileged Access Management Cloud CyberArk Secrets Flows is an identityPrivilege Management Security orchestration tool that automates identity management tasks through no-code app integrations and workflows for identity data, processes, and events. Data Identity Management Environments Data Centers OT Identity Security Intelligence Workloads Shared Services Devices Hybrid & Multi-Cloud Single Admin Portal | Workflows | Unified Audit | Authentication & Authorization SaaS SaaS | Hybrid | Self-Hosted cyberark.com APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP IoT IT Ops Tool APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP Microsoft Azure APP APP Google Cloud APP Office 365 Amazon APP APP Salesforce Network Devices APP APP APP APP Database APP APP APP APP App Server APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP VMs APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP APP Zoom Cloud Native Apps G Suite Containers VM’s & Storage Serverless APP APP Admin Office Copyright © 2022 CyberArk Software Ltd. All rights reserved. Work from Home DevOps Temporary Location Apps/Machine 3rd Party Workforce Mac PC Mobile cyberark.com 18